![ADCluemmelSec on Twitter: "So you want to run @PythonResponder's https://t.co/VbAV7aZWMw in WSL? reg add HKLM\SYSTEM\CurrentControlSet\Services\NetBT /v SMBDeviceEnabled /t REG_QWORD /d 0 Stop-Service "LanmanServer" -Force Set-Service "LanmanServer ... ADCluemmelSec on Twitter: "So you want to run @PythonResponder's https://t.co/VbAV7aZWMw in WSL? reg add HKLM\SYSTEM\CurrentControlSet\Services\NetBT /v SMBDeviceEnabled /t REG_QWORD /d 0 Stop-Service "LanmanServer" -Force Set-Service "LanmanServer ...](https://pbs.twimg.com/media/FdLcRAxXEAAGxFT.png)
ADCluemmelSec on Twitter: "So you want to run @PythonResponder's https://t.co/VbAV7aZWMw in WSL? reg add HKLM\SYSTEM\CurrentControlSet\Services\NetBT /v SMBDeviceEnabled /t REG_QWORD /d 0 Stop-Service "LanmanServer" -Force Set-Service "LanmanServer ...
GitHub - SpiderLabs/Responder: Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
![Controlling the domain controller (Part 1) - LLMNR poisoning with Responder. py and cracking NTLMv2 tokens · Jorge Lajara Website Controlling the domain controller (Part 1) - LLMNR poisoning with Responder. py and cracking NTLMv2 tokens · Jorge Lajara Website](https://jlajara.gitlab.io/assets/images/posts/20181104/5.png)
Controlling the domain controller (Part 1) - LLMNR poisoning with Responder. py and cracking NTLMv2 tokens · Jorge Lajara Website
![Gaining Credentials Easily with Responder Tool | by Yosaamando | MII Cyber Security Consulting Services | Medium Gaining Credentials Easily with Responder Tool | by Yosaamando | MII Cyber Security Consulting Services | Medium](https://miro.medium.com/v2/resize:fit:602/1*jjZOQkXGT5HpRYeP_mY9VQ.png)